pwnwithlove Profile Banner
pwnii Profile
pwnii

@pwnwithlove

Followers
3K
Following
3K
Media
43
Statuses
536

bug bounty lover, breaking stuff on @yeswehack & worldcuping 🇫🇷 at @Hacker0x01 || president of @esnhack, trying to keep hacking underground || CVE-2023-44352

ଘ(∩^o^)⊃━☆:・゚✧*:・゚✧✯♡❀
Joined November 2021
Don't wanna be here? Send us removal request.
@pwnwithlove
pwnii
1 year
today with @Brumens2 we received a 50,000€ reward for discovering a bug in a public program !! don't be shy, go hunt in public programs too @yeswehack ʚ(。˃ ᵕ ˂ )ɞ
56
26
471
@yeswehack
YesWeHack ⠵
3 days
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers https://t.co/2iQTDnyY0p
0
6
52
@pwnwithlove
pwnii
5 days
bug bounties bought me this view last month (*ᴗ͈ˬᴗ͈)ꕤ*.゚🇯🇵 started hunting bugs, ended up hunting the perfect ramen in Japan.. thanks @yeswehack
3
3
187
@yeswehack
YesWeHack ⠵
15 days
SSL pinning blocking your traffic? Medusa by @Ch0pin comes with ready Frida scripts for common bypasses, with many modules including ssl unpinning to test against pinned apps. Full setup guide 👉 https://t.co/A7EAPoKf3U #BugBounty #BugBountyTips
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
0
19
154
@esnhack
ESN'HACK
1 month
[INFO] L'association ESN'HACK a changé de bureau pour l'année 2025-2026. Prochainement, beaucoup de choses vont changer. Toutes les informations seront sur https://t.co/zKMpgfraXn.
0
3
5
@pwnwithlove
pwnii
2 months
just dropped a new article about my current way of setting up an android bug bounty lab ヾ(˶ᵔ ᗜ ᵔ˶) it’s the setup I use myself, and I’ve found nice web bugs on android apps with nothing more than a rooted pixel, frida, and some traffic interception https://t.co/Fcg70n4r5V
Tweet card summary image
yeswehack.com
Covering the pros and cons of emulators versus real devices, and how to configure Magisk, Burp, Frida, Medusa and other mobile hacking tools.
6
43
176
@yeswehack
YesWeHack ⠵
3 months
In the latest #TalkiePwnii, @pwnwithlove takes on a Dojo challenge about predictable tokens & YAML deserialization in Python 🐍 From predictable tokens to achieving RCE via unsafe YAML load - watch the full exploit 👇 #BugBountyTips #YesWeRHackers https://t.co/hRBY96bXRO
0
6
25
@albinowax
James Kettle
3 months
The whitepaper is live! Learn how to win the HTTP desync endgame... and why HTTP/1.1 needs to die:
Tweet card summary image
http1mustdie.com
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
19
247
752
@yeswehack
YesWeHack ⠵
3 months
In the latest #TalkiePwnii, @pwnwithlove dives into Hex Color Palette, a Dojo challenge she created 🎨 From XXE exploitation to error-based file disclosure via parameter entities in lxml - learn how to use local DTD to exfiltrate sensitive files👇 https://t.co/0xaMlmiVoX
5
9
44
@pwnwithlove
pwnii
4 months
in lxml <= 5.3.2 with libxml2 2.12.x, XXE using parameter entities was possible due to libxml2 behavior - allowing indirect overrides of local DTDs. this worked even without resolve_entities, since libxml2 expanded parameter entities anyway :) it didn’t really make noise since
bugs.launchpad.net
lxml lib from 5.0.0 restricts XXE parsing and requires resolve_entities to disable the restriction Thus the xml below ``` ]> &xxe; ``` will not work without resolve_entities: ``` from lxml import...
@yeswehack
YesWeHack ⠵
4 months
What happens when a Dojo challenge collides with a library update? 🔍 The Hex Color Palette challenge used to rely on a specific XXE flow – until lxml changed the rules. Find out why our latest Dojo report includes two different payloads and reports that leak the same flag via
0
1
31
@yeswehack
YesWeHack ⠵
4 months
Want to get more out of @CaidoIO for your #BugBounty workflow? There might be a surprise in the video... 🎁 In Part 2 of our #TalkiePwnii Caido series, @pwnwithlove explores advanced features and plugins like QuickSSRF, AuthMatrix, YesWeCaido & more 👇 https://t.co/1fEvT4pMRo
2
11
44
@CristiVlad25
🇷🇴 cristi
4 months
Good writing here by @yeswehack. When I get nostalgic on recon, I often 'dig' into the past using some variation of what's mention in the article, though my approach is more manual than tools (by simply spending more time on wayback machine). https://t.co/Z3e1Ne8jtd
Tweet card summary image
yeswehack.com
Learn and leverage the lessons of internet history: on the merits of archive-based recon plus some useful commands and tools for performing these techniques.
2
22
108
@yeswehack
YesWeHack ⠵
4 months
📱 Want to pwn Android apps from the inside? Let’s talk about Drozer, one of the most powerful tools for Android app security. It allows you to explore and interact with internal app components (like Activities, Services, Broadcast Receivers, and ContentProviders) to uncover
1
29
128
@_k4non
kanon
5 months
なんか死ぬほど踊ったきがする
1
1
8
@yeswehack
YesWeHack ⠵
5 months
In the latest episode of #TalkiePwnii, @pwnwithlove analyses Ruby Treasure, a Dojo challenge by @Brumens2 💎 From regex bypass to RCE through https://t.co/hapWHurtzH in Ruby - see how weak validation can lead to code execution! 👇 #YesWeRHackers https://t.co/IYRyrfU2W1
0
3
22
@yeswehack
YesWeHack ⠵
6 months
Know much about finding and exploiting path traversal or arbitrary file read vulnerabilities? 🤔 Learn practical attacks leveraging ../../ to bypass filters, hit internal APIs, and read sensitive files across systems 👇 https://t.co/yr0fec5Dff
Tweet card summary image
yeswehack.com
Know much about exploiting path traversal or arbitrary file read vulnerabilities? Learn some practical attacks for unearthing high impact, lucrative vulnerabilities.
0
8
35
@pwnwithlove
pwnii
7 months
i've made some android challenges - feel free to check them out if you're into that kind of stuff! they’re pretty rare in most CTFs :p the last one is based on a real bug bounty I reported, and is linked to a real application I can control ;)
@MidnightFlag
Midnight Flag CTF
7 months
🚨 QUALIFIERS ARE NOW OPEN! Good luck to all the challengers, the CTF will close tomorrow at 8 P.M (Paris time). ➡️ Join the Insurrection right here:
0
5
26
@torproject
The Tor Project
7 months
@Skyyyuh no idea
32
46
1K
@yeswehack
YesWeHack ⠵
7 months
Curious to find out how @CaidoIO could fit into your #BugBounty workflow? 🐞 In this special episode of #TalkiePwnii, @pwnwithlove shows Caido’s core features - from HTTP interception to workflow automation. Don't miss it 👇 #BugBountyTips #Caido https://t.co/OvvgsYCHxN
0
12
60
@uwu_underground
UwU Underground
8 months
Fuck @firefox
40
42
760